If you haven't thought it yourself, you likely know someone who has. There's an impression that Google just "knows" things. One thing the company says it knows for sure is that you are concerned about your privacy. They want to show their customers they are responsive to that. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Google has created an easy way for you to see the data that's being collected about you. Below she out...More >>

If you haven't thought it yourself, you likely know someone who has. There's an impression that Google just "knows" things. One thing the company says it knows for sure is that you are concerned about your privacy. They want to show their customers they are responsive to that. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Google has created an easy way for you to see the data that's being collected about you. Below she out...More >>

If you play the hot smart phone crazy Pokemon Go, or any other smart phone app game, there are a few things you have to think about. WBTV Cyber Expert Theresa Payton offered a checklist for you before you agree to play any game on your phone. Her advice follows: Safety tips: 1. Check the games settings and make sure it's not accessing "all" of your personal information. 2. Use a unique email address 3. Tie in app purchases to a pre paid gift card...More >>

If you play the hot smart phone crazy Pokemon Go, or any other smart phone app game, there are a few things you have to think about. WBTV Cyber Expert Theresa Payton offered a checklist for you before you agree to play any game on your phone. Her advice follows: Safety tips: 1. Check the games settings and make sure it's not accessing "all" of your personal information. 2. Use a unique email address 3. Tie in app purchases to a pre paid gift card...More >>

If you have "smart" devices in your home, such as thermostats or light controls, you know if the internet goes down you're in trouble. Without that connection to cyberspace those devices may not work. WBTV Cyber Expert Theresa Payton has some advice if you want to keep that smart home operating smoothly. That advice is below: When the internet goes down, consider it as catastrophic as a power outage if all of your devices are "smart" or Internet...More >>

If you have "smart" devices in your home, such as thermostats or light controls, you know if the internet goes down you're in trouble. Without that connection to cyberspace those devices may not work. WBTV Cyber Expert Theresa Payton has some advice if you want to keep that smart home operating smoothly. That advice is below: When the internet goes down, consider it as catastrophic as a power outage if all of your devices are "smart" or Internet...More >>

Windows 10 users who enjoy some of it's conveniences have something to consider. WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton wants you to think about a couple of things before you use one of it's features. "WiFi Sense" is meant to help you get online quickly by automatically connecting to WiFi networks. Payton says the service was also sharing your WiFi password with Outlook and Skype. Payton explains the information is encrypted, which is...More >>

Windows 10 users who enjoy some of it's conveniences have something to consider. WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton wants you to think about a couple of things before you use one of it's features. "WiFi Sense" is meant to help you get online quickly by automatically connecting to WiFi networks. Payton says the service was also sharing your WiFi password with Outlook and Skype. Payton explains the information is encrypted, which is...More >>

When cyber criminals find a scam that works, they don't want to retire it. That's why the fake technical support scams pop up time and again. That's when they call or email pretending to be your device manufacturers "tech support" and claim your device needs a repair. It is their sneaky way into getting you to let them into your computer so they can mine for personal information. We asked WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton to tell ...

When cyber criminals find a scam that works, they don't want to retire it. That's why the fake technical support scams pop up time and again. That's when they call or email pretending to be your device manufacturers "tech support" and claim your device needs a repair. It is their sneaky way into getting you to let them into your computer so they can mine for personal information. We asked WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton to tell ...

A new form of malware is making the rounds. It is striking computers in and around Charlotte. It is called "Locky" and this strain scrambles, encrypts and re-names all of your important files. You'll know you have it if suddenly your file names end in ".locky". The cybercriminals will tell you that THE ONLY WAY to get your files back is to purchase the decryption key via the dark web and pay roughly $200-$500 in bitcoin which is a digital, untraceable...

A new form of malware is making the rounds. It is striking computers in and around Charlotte. It is called "Locky" and this strain scrambles, encrypts and re-names all of your important files. You'll know you have it if suddenly your file names end in ".locky". The cybercriminals will tell you that THE ONLY WAY to get your files back is to purchase the decryption key via the dark web and pay roughly $200-$500 in bitcoin which is a digital, untraceable...

It may seem like Microsoft computers and devices are more often the target of hackers than Apple products, because new alerts seem to be about Microsoft. Apple products can get viruses, but there's something about Microsoft that WBTV Cyber Expert Theresa Payton says is attractive to cyber criminals. "In a new research report, a "White Hat", or good-guy researcher, took a look at the most popular Microsoft malware and viruses and noticed that many of them target Microso...More >>

It may seem like Microsoft computers and devices are more often the target of hackers than Apple products, because new alerts seem to be about Microsoft. Apple products can get viruses, but there's something about Microsoft that WBTV Cyber Expert Theresa Payton says is attractive to cyber criminals. "In a new research report, a "White Hat", or good-guy researcher, took a look at the most popular Microsoft malware and viruses and noticed that many of them target Microso...More >>

Passwords are a recurring theme in the Protecting Your Cyberturf segment. We talk about how many all of us have, how secure they are or are not. We have also talked about other forms of protecting your private information that may in time be the most widely used and secure ways to authenticate who you are. Now we are getting word that even those most secure ways might be vulnerable, too. Many people love the idea of supplying a fingerprint or some type of a physical iden...More >>

Passwords are a recurring theme in the Protecting Your Cyberturf segment. We talk about how many all of us have, how secure they are or are not. We have also talked about other forms of protecting your private information that may in time be the most widely used and secure ways to authenticate who you are. Now we are getting word that even those most secure ways might be vulnerable, too. Many people love the idea of supplying a fingerprint or some type of a physical iden...More >>

What would you give up to ensure you had access to high speed internet? That's the question a new study commissioned by wireless carrier AT & T poses. It gets to the heart of FOMO, or "fear of missing out". The researchers polled people from all 50 states and the District of Columbia. AT&T admits the findings are not nationally representative but the company asked 2,000 Americans what they would sacrifice to stay online. WBTV Cyber Expert Theresa Payto...More >>

What would you give up to ensure you had access to high speed internet? That's the question a new study commissioned by wireless carrier AT & T poses. It gets to the heart of FOMO, or "fear of missing out". The researchers polled people from all 50 states and the District of Columbia. AT&T admits the findings are not nationally representative but the company asked 2,000 Americans what they would sacrifice to stay online. WBTV Cyber Expert Theresa Payto...More >>

Each year Google performs an annual security report on the Droid operating system for smart phones. Its most recent review found roughly 29% of phone users are not receiving important security upgrades. It is because only phones running the most up to date version of software automatically get those security patches. In some cases many manufacturers are not sending out timely updates and some users do not have their phones set up to automatically receive the patches...More >>

Each year Google performs an annual security report on the Droid operating system for smart phones. Its most recent review found roughly 29% of phone users are not receiving important security upgrades. It is because only phones running the most up to date version of software automatically get those security patches. In some cases many manufacturers are not sending out timely updates and some users do not have their phones set up to automatically receive the patches...More >>

Simply by placing a phone call or dropping an email, scam artists are having good luck conning people out of hundreds of dollars if not more. This scam making the rounds sounds pretty intimidating if you're on the receiving end. It is happening often enough that the US Federal Court System has issued an official warning about it. The scammers claim to be from the court, or from the US Marshall's Office, and they claim you owe a fine because you didn't show up for your assigne...More >>

Simply by placing a phone call or dropping an email, scam artists are having good luck conning people out of hundreds of dollars if not more. This scam making the rounds sounds pretty intimidating if you're on the receiving end. It is happening often enough that the US Federal Court System has issued an official warning about it. The scammers claim to be from the court, or from the US Marshall's Office, and they claim you owe a fine because you didn't show up for your assigne...More >>

Any security breach of private information should be an opportunity for all of us to make sure we're properly protecting our privacy. That's the warning from WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton. She reminds us of this in the wake of "The Panama Papers". 11.5 million documents were leaked anonymously from a prominent Panama-based law firm that helped create shell companies for the world's rich and famous. 200 countries are mentioned...More >>

Any security breach of private information should be an opportunity for all of us to make sure we're properly protecting our privacy. That's the warning from WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton. She reminds us of this in the wake of "The Panama Papers". 11.5 million documents were leaked anonymously from a prominent Panama-based law firm that helped create shell companies for the world's rich and famous. 200 countries are mentioned...More >>

It may be a lesson your parents taught you. Just because you can do something, doesn't mean you should. In this case we're talking about using a cell phone jammer. Jammers prevent phones from working in a certain local area. The devices are readily available to the average person online Still, using one could get you into deep trouble. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says while some organizations and institutions can use jammers,...More >>

It may be a lesson your parents taught you. Just because you can do something, doesn't mean you should. In this case we're talking about using a cell phone jammer. Jammers prevent phones from working in a certain local area. The devices are readily available to the average person online Still, using one could get you into deep trouble. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says while some organizations and institutions can use jammers,...More >>

We told you recently that credit card giant MasterCard is testing a new way to authenticate payments using a selfie. This week Amazon announced it is attempting to do something similar. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Amazon has filed a patent for payment via facial contortion, also known as a selfie. The company filed for the patent in October. Organizations testing this way to pay say it is a safer form of verification than a password.&nbs...More >>

We told you recently that credit card giant MasterCard is testing a new way to authenticate payments using a selfie. This week Amazon announced it is attempting to do something similar. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Amazon has filed a patent for payment via facial contortion, also known as a selfie. The company filed for the patent in October. Organizations testing this way to pay say it is a safer form of verification than a password.&nbs...More >>

If you think being a Mac owner will spare you the hassle of getting viruses on your laptop or desktop, think again. More viruses have spread to Macs in recent years and now the infection of the moment, ransomware, is hitting Mac users too. That's when a cyber-criminal finds his or her way into your computer, accesses your files, and then holds them "hostage" until you pay (usually in Bitcoin) to get them back. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., says...More >>

If you think being a Mac owner will spare you the hassle of getting viruses on your laptop or desktop, think again. More viruses have spread to Macs in recent years and now the infection of the moment, ransomware, is hitting Mac users too. That's when a cyber-criminal finds his or her way into your computer, accesses your files, and then holds them "hostage" until you pay (usually in Bitcoin) to get them back. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., says...More >>

You've heard the phrase "the internet of things", right? It is when everyday objects like your refrigerator or your kids toys can connect to the internet. So many things are connected now, it raises a new privacy concern. We asked WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., how easy it would be for a hacker to peep into your home using these devices. "Using any tool, like Shodan for example, people can spy on you via your internet of things....More >>

You've heard the phrase "the internet of things", right? It is when everyday objects like your refrigerator or your kids toys can connect to the internet. So many things are connected now, it raises a new privacy concern. We asked WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., how easy it would be for a hacker to peep into your home using these devices. "Using any tool, like Shodan for example, people can spy on you via your internet of things....More >>

When is the last time you broke out a map or an atlas? We are all so reliant on GPS because it spares us the trouble of planning a route and it seems to rarely fail us. Unfortunately, like all things tech, it can be hacked. "Good guy" ethical hackers found this recently when they showed how they could simulate a car's journey without the car ever moving. In the demo, they typed into the GPS where they wanted to go and without actually moving or starting on...More >>

When is the last time you broke out a map or an atlas? We are all so reliant on GPS because it spares us the trouble of planning a route and it seems to rarely fail us. Unfortunately, like all things tech, it can be hacked. "Good guy" ethical hackers found this recently when they showed how they could simulate a car's journey without the car ever moving. In the demo, they typed into the GPS where they wanted to go and without actually moving or starting on...More >>

12 times in the past year, someone has knocked on the door of a couple's home in Atlanta, thinking their lost or stolen smart phones were inside. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., found these cases of phone finding software glitches and thought it was a good opportunity to remind you that GPS isn't always the be-all, end-all. Payton says the search function in both Apple's "Find my phone" and Android's "Device Manager" were off in thi...More >>

12 times in the past year, someone has knocked on the door of a couple's home in Atlanta, thinking their lost or stolen smart phones were inside. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., found these cases of phone finding software glitches and thought it was a good opportunity to remind you that GPS isn't always the be-all, end-all. Payton says the search function in both Apple's "Find my phone" and Android's "Device Manager" were off in thi...More >>

If you click into Internet Explorer on your PC to hop onto the internet, it's time to upgrade. We told you a while back that Microsoft would be "retiring" the Windows XP system but it is also ending its support of some versions of Internet Explorer. WBTV Cyber Expert and CEO of Fortalice, Inc. Theresa Payton says Microsoft stopped supporting IE 8 and 9 and in many cases 10. That means there will be no new security patches and that impacts how safe it is to use f...More >>

If you click into Internet Explorer on your PC to hop onto the internet, it's time to upgrade. We told you a while back that Microsoft would be "retiring" the Windows XP system but it is also ending its support of some versions of Internet Explorer. WBTV Cyber Expert and CEO of Fortalice, Inc. Theresa Payton says Microsoft stopped supporting IE 8 and 9 and in many cases 10. That means there will be no new security patches and that impacts how safe it is to use f...More >>

Perhaps by now you have broken in some of the new devices you received as gifts over the holidays. Or, perhaps, you've been unable to pry those new smart phones, tablets, and gaming systems from your children's hands. A lesson learned the hard way is proof you need to have control over how those devices are used. A dad in England realized a little too late that his child had racked up a $5,000 bill with the Apple app store by unknowingly making in-game purchases on his dad's iP...More >>

Perhaps by now you have broken in some of the new devices you received as gifts over the holidays. Or, perhaps, you've been unable to pry those new smart phones, tablets, and gaming systems from your children's hands. A lesson learned the hard way is proof you need to have control over how those devices are used. A dad in England realized a little too late that his child had racked up a $5,000 bill with the Apple app store by unknowingly making in-game purchases on his dad's iP...More >>

Thank goodness for good-guy hackers. An ethical hacker, who looks for data that needs to be protected as a hobby, is now working with law enforcement to assist them in investigating a data breach he exposed. It involved voter data dating back as far as 2000. The information included voter names, phone numbers, home addresses, dates of birth, political parties, whether they voted in the primary or general elections going back to 2000, gender and other personal details. WB...More >>

Thank goodness for good-guy hackers. An ethical hacker, who looks for data that needs to be protected as a hobby, is now working with law enforcement to assist them in investigating a data breach he exposed. It involved voter data dating back as far as 2000. The information included voter names, phone numbers, home addresses, dates of birth, political parties, whether they voted in the primary or general elections going back to 2000, gender and other personal details. WB...More >>

It is easy to be trusting of what we see or read online. However, as adults, we typically know to look at those things with a critical eye.A new study by Ofcom, the U.K.'s communication regulations commission, shows teens are far too trusting with that information.The study, which you can read by clicking here, found roughly one in five children aged 12 to 15 believe that information found in search engines like Yahoo! Google or Bing must be true. It also indicates many teen...More >>

It is easy to be trusting of what we see or read online. However, as adults, we typically know to look at those things with a critical eye.A new study by Ofcom, the U.K.'s communication regulations commission, shows teens are far too trusting with that information.The study, which you can read by clicking here, found roughly one in five children aged 12 to 15 believe that information found in search engines like Yahoo! Google or Bing must be true. It also indicates many teen...More >>

We've all become quite good at locking our smart phones, with pass codes or fingerprints, in order to protect prying eyes from peeping our private information.WBTV Cyber Expert, and founder of Fortalice, Theresa Payton says she's found a weak link in the security chain.Her name is Siri.Payton says you can press the home button of a locked phone and still get Siri to tell you things about the owner of that phone.She suggests that you try holding the home button and telling Siri the foll...More >>

We've all become quite good at locking our smart phones, with pass codes or fingerprints, in order to protect prying eyes from peeping our private information.WBTV Cyber Expert, and founder of Fortalice, Theresa Payton says she's found a weak link in the security chain.Her name is Siri.Payton says you can press the home button of a locked phone and still get Siri to tell you things about the owner of that phone.She suggests that you try holding the home button and telling Siri the foll...More >>

If you have stayed in a hotel that is in the Starwood chain in the last year, you may have fallen victim to a data breach.The chain, which includes Sheraton and Westin among others, was infiltrated by hackers at 54 of it's locations in the US and Canada. The malware has since been removed, according to company officials. The targeted point of sale operations in the hotel gift shops, restaurants, and other retail locations but not the reservation systems.You can view the ful...More >>

If you have stayed in a hotel that is in the Starwood chain in the last year, you may have fallen victim to a data breach.The chain, which includes Sheraton and Westin among others, was infiltrated by hackers at 54 of it's locations in the US and Canada. The malware has since been removed, according to company officials. The targeted point of sale operations in the hotel gift shops, restaurants, and other retail locations but not the reservation systems.You can view the ful...More >>

There are certain apps, if you know where to find them, that can help keep your cyber conversations private.WBTV Cyber Expert Theresa Payton says so-called "dark apps" are meant to be used by "good guys" but often fall into the hands of cybercriminals.There are indications terror groups, like ISIS, are using these apps to communicate and plan attacks away from the eyes of law enforcement, even if they have search warrants. Payton says the apps offer encryption ...More >>

There are certain apps, if you know where to find them, that can help keep your cyber conversations private.WBTV Cyber Expert Theresa Payton says so-called "dark apps" are meant to be used by "good guys" but often fall into the hands of cybercriminals.There are indications terror groups, like ISIS, are using these apps to communicate and plan attacks away from the eyes of law enforcement, even if they have search warrants. Payton says the apps offer encryption ...More >>

It turns out some companies protect your privacy better than others, but no company is a true standout.That is one result of a new study called Ranking Digital Rights which looked at the privacy policies and user agreements of many big tech companies and graded them based on how well they protect you.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton says the world’s top tech companies mostly rate a "D" or worse in protecting your privacy and freedom of e...More >>

It turns out some companies protect your privacy better than others, but no company is a true standout.That is one result of a new study called Ranking Digital Rights which looked at the privacy policies and user agreements of many big tech companies and graded them based on how well they protect you.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton says the world’s top tech companies mostly rate a "D" or worse in protecting your privacy and freedom of e...More >>

Your past may be coming back to haunt you.Facebook has changed how people can search all of your posts, even the really old ones. However, you can turn back the clock.WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says Facebook tweaked the software it uses to power searches. Now roughly 2 trillion older posts will be added to the Facebook search profile. Facebook says it is an effort to give you the most recent, relevant public posts along with...More >>

Your past may be coming back to haunt you.Facebook has changed how people can search all of your posts, even the really old ones. However, you can turn back the clock.WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says Facebook tweaked the software it uses to power searches. Now roughly 2 trillion older posts will be added to the Facebook search profile. Facebook says it is an effort to give you the most recent, relevant public posts along with...More >>

They may look like your average smart phone app, but there's a huge market for "secret" apps or "decoy" apps that can hide someone's activity on their cell phones.This is an issue for parents who do their best to try to keep tabs on their teens smart phone use.WBTV Cyber Expert, and CEO of Fortalice, LLC Theresa Payton, says there are many legitimate reasons why a person may want to hide messages on their cell phones. They might be protecting sensitive, person...More >>

They may look like your average smart phone app, but there's a huge market for "secret" apps or "decoy" apps that can hide someone's activity on their cell phones.This is an issue for parents who do their best to try to keep tabs on their teens smart phone use.WBTV Cyber Expert, and CEO of Fortalice, LLC Theresa Payton, says there are many legitimate reasons why a person may want to hide messages on their cell phones. They might be protecting sensitive, person...More >>

iPhone and iPad users have had some time now to decide whether to upgrade to the new operating system iOS9. Some bugs have been worked out and WBTV Cyber Expert, and CEO of Fortalice, Theresa Payton says she's very excited about the privacy and security options.Almost all of these features can be found on your device under the "settings" function. Payton shares her thoughts and advice below:New Security Features1. LOCK IT UP! Set a longer (and stronger) six-di...More >>

iPhone and iPad users have had some time now to decide whether to upgrade to the new operating system iOS9. Some bugs have been worked out and WBTV Cyber Expert, and CEO of Fortalice, Theresa Payton says she's very excited about the privacy and security options.Almost all of these features can be found on your device under the "settings" function. Payton shares her thoughts and advice below:New Security Features1. LOCK IT UP! Set a longer (and stronger) six-di...More >>

The father of a young girl has sued a major social media company for failing to enforce its age restriction policy after claiming his daughter was exposed to sexual predators when she signed up for an account at age 11.Granted, she seemingly violated the site's age policy. However, our Cyber Expert, and CEO of Fortalice Theresa Payton, says parents can use this as a teachable moment.While most of the big social media sites do have age restrictions, anyone with a little tech savvy...More >>

The father of a young girl has sued a major social media company for failing to enforce its age restriction policy after claiming his daughter was exposed to sexual predators when she signed up for an account at age 11.Granted, she seemingly violated the site's age policy. However, our Cyber Expert, and CEO of Fortalice Theresa Payton, says parents can use this as a teachable moment.While most of the big social media sites do have age restrictions, anyone with a little tech savvy...More >>

So much of what we own is "smart".Smart phones, smart watches, in some cases even smart clothing all intended to make our lives easier and more convenient.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton has a quick reminder before you put on that smart accessory."Researchers have shown that a smartwatch's motion sensors can be used to detect what keys you're pressing which can help others guess the words you're typing," Payton explained.She says it...More >>

So much of what we own is "smart".Smart phones, smart watches, in some cases even smart clothing all intended to make our lives easier and more convenient.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton has a quick reminder before you put on that smart accessory."Researchers have shown that a smartwatch's motion sensors can be used to detect what keys you're pressing which can help others guess the words you're typing," Payton explained.She says it...More >>

You may not be ready to download Windows 10 to your PC but Microsoft has it ready for you when you are. So ready, in fact, that it's already sitting there in the background of your system waiting.Microsoft says it helps up-gradable devices get ready for Windows 10 by downloading the files those who have chosen to receive updates through Windows Update will need if they decide to upgrade.That certainly is convenient.However, our cyber expert is warning you might want to uninstall ...More >>

You may not be ready to download Windows 10 to your PC but Microsoft has it ready for you when you are. So ready, in fact, that it's already sitting there in the background of your system waiting.Microsoft says it helps up-gradable devices get ready for Windows 10 by downloading the files those who have chosen to receive updates through Windows Update will need if they decide to upgrade.That certainly is convenient.However, our cyber expert is warning you might want to uninstall ...More >>

There's new help in ridding the internet of inappropriate pictures of children used by sexual predators.Big online household names like Google, Facebook, Twitter, Microsoft and Yahoo have committed to policing and removing these images of child sexual abuse. They'll work in tandem with an independent group called the Internet Watch Foundation (IWF).WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says the IWF will share any links that portray children in sexual ways ...More >>

There's new help in ridding the internet of inappropriate pictures of children used by sexual predators.Big online household names like Google, Facebook, Twitter, Microsoft and Yahoo have committed to policing and removing these images of child sexual abuse. They'll work in tandem with an independent group called the Internet Watch Foundation (IWF).WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says the IWF will share any links that portray children in sexual ways ...More >>

You're on it once a day, maybe twice a day, maybe all day. A bug has been found by a good guy, a decoder, which allowed him to get past Facebook encryption and see Facebook user id’s, cellphones, pictures, and other personal data.Better that he caught the problem and not a bad-guy cyber creep.Here's the good news. Facebook says it is always improving it's security, and, WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says there are easy s...More >>

You're on it once a day, maybe twice a day, maybe all day. A bug has been found by a good guy, a decoder, which allowed him to get past Facebook encryption and see Facebook user id’s, cellphones, pictures, and other personal data.Better that he caught the problem and not a bad-guy cyber creep.Here's the good news. Facebook says it is always improving it's security, and, WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says there are easy s...More >>

You've learned by now that online scammers go where the action is.Right now the hot download for PC users is the new Windows 10 operating system from Microsoft.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton, says she didn't expect it would take long before the scams around Windows 10 began. She says CISCO recently sent an alert about a scam email making the rounds. Theresa breaks down what you need to know and her advice follows:Tips:1. Bewa...More >>

You've learned by now that online scammers go where the action is.Right now the hot download for PC users is the new Windows 10 operating system from Microsoft.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton, says she didn't expect it would take long before the scams around Windows 10 began. She says CISCO recently sent an alert about a scam email making the rounds. Theresa breaks down what you need to know and her advice follows:Tips:1. Bewa...More >>

We know the risk of a privacy breach in our lives is possible, but how probable is it? You may think protecting your privacy online requires so many steps and is such a hassle that it isn't worth the effort. WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says it is worth the effort and the process does not have to be overwhelming.She offers what she calls the "Fabulous 4". They are her easy steps to securing your online privacy. Sh...More >>

We know the risk of a privacy breach in our lives is possible, but how probable is it? You may think protecting your privacy online requires so many steps and is such a hassle that it isn't worth the effort. WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says it is worth the effort and the process does not have to be overwhelming.She offers what she calls the "Fabulous 4". They are her easy steps to securing your online privacy. Sh...More >>

Whether it is your home or work computer, there's likely a spam blocker installed within your email system.Typically it catches the bad messages and pulls them away from the good. However, every once in a while an email you need winds up in your spam folder.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says there is good news. She says technology is improving and new features may help you block spam better without missing important emails.Payton says all...More >>

Whether it is your home or work computer, there's likely a spam blocker installed within your email system.Typically it catches the bad messages and pulls them away from the good. However, every once in a while an email you need winds up in your spam folder.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says there is good news. She says technology is improving and new features may help you block spam better without missing important emails.Payton says all...More >>

Theres a bug in some popular software that you might use every day.Adobe Flash promises a fix is coming to a bug that WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says allows malware to be installed onto your computer. Payton adds the bug was found when a digital surveillance company was hacked.When they looked at how the bad guys hacked them, they found the Adobe flaw, Payton said.Payton warns the vulnerabilities affect almost all computers striking some Windows, M...More >>

Theres a bug in some popular software that you might use every day.Adobe Flash promises a fix is coming to a bug that WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says allows malware to be installed onto your computer. Payton adds the bug was found when a digital surveillance company was hacked.When they looked at how the bad guys hacked them, they found the Adobe flaw, Payton said.Payton warns the vulnerabilities affect almost all computers striking some Windows, M...More >>

We count on online reviews to help us make decisions about the products we buy, the services we agree to, and the restaurants where we eat. Would it surprise you to know that some of the reviews you count on could actually be fake?WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, found a Harvard/Boston University study which indicates as many as a third of the reviews online could be from people paid to give good or bad feedback about a particular company.Payton says it...More >>

We count on online reviews to help us make decisions about the products we buy, the services we agree to, and the restaurants where we eat. Would it surprise you to know that some of the reviews you count on could actually be fake?WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, found a Harvard/Boston University study which indicates as many as a third of the reviews online could be from people paid to give good or bad feedback about a particular company.Payton says it...More >>

Where do you store your passwords?In a notebook? Written on sticky notes scattered all over your computer desk? Many of us choose that route because we aren't so sure about those online password vault services.WBTV Cyber Expert, CEO of Fortalice Solutions Theresa Payton, says there are some new advances that might make these online vaults a better option for you now. Her advice follows:Before you use one of these free or inexpensive services:Do your homework.Read the privacy policy.Type into ...More >>

Where do you store your passwords?In a notebook? Written on sticky notes scattered all over your computer desk? Many of us choose that route because we aren't so sure about those online password vault services.WBTV Cyber Expert, CEO of Fortalice Solutions Theresa Payton, says there are some new advances that might make these online vaults a better option for you now. Her advice follows:Before you use one of these free or inexpensive services:Do your homework.Read the privacy policy.Type into ...More >>

More than 800 million people are actively using a messaging app called "WhatsApp". Recently a potentially hackable feature was discovered.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, explains what she's learned and shares a couple of steps you can take to protect yourself if you use this app.Her advice follows:Right now, here is what we know1. The WhatsApp account could be hijacked without knowing your device's password2. The hacker does not have to be sophisticated to snoop ...More >>

More than 800 million people are actively using a messaging app called "WhatsApp". Recently a potentially hackable feature was discovered.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, explains what she's learned and shares a couple of steps you can take to protect yourself if you use this app.Her advice follows:Right now, here is what we know1. The WhatsApp account could be hijacked without knowing your device's password2. The hacker does not have to be sophisticated to snoop ...More >>

What is the best age to start using social media?It is a question parents struggle to answer. We turned to WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, for advice.She says the age at which a child starts using sites like Facebook, Twitter, Snapchat and others really depends. Her advice follows:Determining Age Requirements:1. Your child should at least meet the minimum guidelines of each site. Read the terms of service for each site they use to determine the minimum age. Each ...More >>

What is the best age to start using social media?It is a question parents struggle to answer. We turned to WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, for advice.She says the age at which a child starts using sites like Facebook, Twitter, Snapchat and others really depends. Her advice follows:Determining Age Requirements:1. Your child should at least meet the minimum guidelines of each site. Read the terms of service for each site they use to determine the minimum age. Each ...More >>

Live pictures on the go are easier than ever. Smart phone apps like Periscope and Meerkat allow you to send a live feed from wherever you are to followers all over the world.They're cool, immediate, and it's easy to get addicted.However, WBTV Cyber Expert Theresa Payton says there are some things to think about before you fire up your feed.Her information and advice follows:What is live streaming and how does it work for these two apps?Live streaming allows you to video tape from your smart p...More >>

Live pictures on the go are easier than ever. Smart phone apps like Periscope and Meerkat allow you to send a live feed from wherever you are to followers all over the world.They're cool, immediate, and it's easy to get addicted.However, WBTV Cyber Expert Theresa Payton says there are some things to think about before you fire up your feed.Her information and advice follows:What is live streaming and how does it work for these two apps?Live streaming allows you to video tape from your smart p...More >>

Could airplanes be vulnerable to hackers?WBTV Cyber Expert Theresa Payton, founder of Fortalice Solutions, says it is possible but not likely.Still, she cautions, a new report by the US Government Accountability Office should be seen as a wake-up call.Payton says the report indicates the planes that could be hacked are some of the most popular in the sky. They include the Boeing 787 Dreamliner, the Airbus A350 and A380 aircraft. Other models and private jets could also be at risk according to...More >>

Could airplanes be vulnerable to hackers?WBTV Cyber Expert Theresa Payton, founder of Fortalice Solutions, says it is possible but not likely.Still, she cautions, a new report by the US Government Accountability Office should be seen as a wake-up call.Payton says the report indicates the planes that could be hacked are some of the most popular in the sky. They include the Boeing 787 Dreamliner, the Airbus A350 and A380 aircraft. Other models and private jets could also be at risk according to...More >>

You might, however, assume if a company promises your private information is protected, it always will be. WBTV Cyber Expert, and CEO of cyber security firm Fortalice Solutions, Theresa Payton tells us that isn't always the case.More >>

You might, however, assume if a company promises your private information is protected, it always will be. WBTV Cyber Expert, and CEO of cyber security firm Fortalice Solutions, Theresa Payton tells us that isn't always the case.More >>

With such a large military population, people living across North Carolina need to be aware of how self-proclaimed terrorists are targeting members of the US military and their families.WBTV Cyber Expert Theresa Payton has a warning for all of us.She says terrorists abroad are encouraging "lone wolf" attacks against the military members and their families using a hacking technique called doxing. The way Theresa describes it, it is when a person or group of people take all of your personal inf...More >>

With such a large military population, people living across North Carolina need to be aware of how self-proclaimed terrorists are targeting members of the US military and their families.WBTV Cyber Expert Theresa Payton has a warning for all of us.She says terrorists abroad are encouraging "lone wolf" attacks against the military members and their families using a hacking technique called doxing. The way Theresa describes it, it is when a person or group of people take all of your personal inf...More >>

There are all types of technology in our cars these days. It helps us get around, allows us to talk on the phone "hands-free" and controls the music we listen to.Could that technology also be watching you? WBTV Cyber Expert Theresa Payton says it is possible for some of your tech to be keeping tabs on you. Which is why she says we need to ask plenty of questions before we buy or rent a car.She uses the example of rental car company Hertz. The company's newest version of it's on-board system w...More >>

There are all types of technology in our cars these days. It helps us get around, allows us to talk on the phone "hands-free" and controls the music we listen to.Could that technology also be watching you? WBTV Cyber Expert Theresa Payton says it is possible for some of your tech to be keeping tabs on you. Which is why she says we need to ask plenty of questions before we buy or rent a car.She uses the example of rental car company Hertz. The company's newest version of it's on-board system w...More >>

This is the time of year you rejoice or dread. It depends whether you owe the IRS or you get a refund.The tax deadline is fast approaching and this year tax experts say they're seeing even more cases of taxpayers becoming the target of fraudsters.We asked WBTV's cyber expert of Fortalice Solutions what's behind the spike and she offered a few suggestions and advice. That information follows:What is fueling the tax fraud?(1) all those breaches that you heard about last year? That treasure trov...More >>

This is the time of year you rejoice or dread. It depends whether you owe the IRS or you get a refund.The tax deadline is fast approaching and this year tax experts say they're seeing even more cases of taxpayers becoming the target of fraudsters.We asked WBTV's cyber expert of Fortalice Solutions what's behind the spike and she offered a few suggestions and advice. That information follows:What is fueling the tax fraud?(1) all those breaches that you heard about last year? That treasure trov...More >>

Have you ever realized the power you have beyond a search engine to get a personal assistant like service? That's where "Google hacks" come in. Their sole purpose is to make life easier.We have so many tools available to us, it can be overwhelming. Still you can get help in some simple ways. WBTV Cyber Expert Theresa Payton, with Fortalice Solutions, shows you how to turn Google search into a life hack to make your life easier.Her suggestions follow:Go to Google and type in...1. Check a fligh...More >>

Have you ever realized the power you have beyond a search engine to get a personal assistant like service? That's where "Google hacks" come in. Their sole purpose is to make life easier.We have so many tools available to us, it can be overwhelming. Still you can get help in some simple ways. WBTV Cyber Expert Theresa Payton, with Fortalice Solutions, shows you how to turn Google search into a life hack to make your life easier.Her suggestions follow:Go to Google and type in...1. Check a fligh...More >>

It has happened to all of us. You are working everywhere you go.The airport. The coffee shop. The beach. Then suddenly, you realize you need to leave your device unattended. Maybe it's to pay for something or visit the bathroom? Maybe it's to check on something in your car. Or perhaps you set it down just for a moment to check in at a hotel or cafe? Regardless, you have that moment where you question - should I leave it here or shouldn't I?Theresa Payton of Fortalice Solutions offers advice t...More >>

It has happened to all of us. You are working everywhere you go.The airport. The coffee shop. The beach. Then suddenly, you realize you need to leave your device unattended. Maybe it's to pay for something or visit the bathroom? Maybe it's to check on something in your car. Or perhaps you set it down just for a moment to check in at a hotel or cafe? Regardless, you have that moment where you question - should I leave it here or shouldn't I?Theresa Payton of Fortalice Solutions offers advice t...More >>

The most common passwords used are still pretty common. "Password" and "123456" may be easy to remember but they are likely making it very easy for hackers to get into your account if you're using them.SplashData released it's annual "Worst Passwords List". WBTV Cyber Expert Theresa Payton shared the list with us. She says in the top 25 this year there are sports themed passwords like "baseball" and "football" and passwords like "dragon" related to favorite TV shows like Game of Thrones.Payto...More >>

The most common passwords used are still pretty common. "Password" and "123456" may be easy to remember but they are likely making it very easy for hackers to get into your account if you're using them.SplashData released it's annual "Worst Passwords List". WBTV Cyber Expert Theresa Payton shared the list with us. She says in the top 25 this year there are sports themed passwords like "baseball" and "football" and passwords like "dragon" related to favorite TV shows like Game of Thrones.Payto...More >>

Last year could have been called the year of the hack.Customer credit cards compromised at Target, Michaels and several other retailers may have left many shoppers wondering if it is safe to pay with plastic.Our cyber expert says some of the major credit card companies, who originally planned to go with a "chip and PIN" system for all card holders starting this year are now rethinking that plan.Theresa Payton says many US companies have worried that adding a PIN requirement at the point of sa...More >>

Last year could have been called the year of the hack.Customer credit cards compromised at Target, Michaels and several other retailers may have left many shoppers wondering if it is safe to pay with plastic.Our cyber expert says some of the major credit card companies, who originally planned to go with a "chip and PIN" system for all card holders starting this year are now rethinking that plan.Theresa Payton says many US companies have worried that adding a PIN requirement at the point of sa...More >>

We have talked about the dark side of the internet and that dark side has become the very place human traffickers are doing their dirty work.The Carolinas, particularly Charlotte, are a hotbed for the human trafficking trade because of our proximity to so many highways. They give traffickers easy access in and out of town to steal their victims away.However, the internet is playing a larger role than ever in giving traffickers access to potential victims.WBTV's cyber expert, Theresa Payton of...More >>

We have talked about the dark side of the internet and that dark side has become the very place human traffickers are doing their dirty work.The Carolinas, particularly Charlotte, are a hotbed for the human trafficking trade because of our proximity to so many highways. They give traffickers easy access in and out of town to steal their victims away.However, the internet is playing a larger role than ever in giving traffickers access to potential victims.WBTV's cyber expert, Theresa Payton of...More >>

From the Consumer Electronics Show this year, we'll see all kinds of the greatest gadgets about to hit the market.However, privacy and safety are important to remember when purchasing these new products.More >>

From the Consumer Electronics Show this year, we'll see all kinds of the greatest gadgets about to hit the market.However, privacy and safety are important to remember when purchasing these new products.More >>

There is a new support scam making the rounds and our Cyber Expert has received so many calls about it that she wanted to pass along a warning to you.Theresa Payton says cybercriminals are making unsolicited calls to people's homes to say that they are customer service from Microsoft or Apple and that they proactively noticed a problem on your computer. While it may sound like great customer service, Payton says it is likely a scam.Her advice and resources follow:How it works:1. They call or ...More >>

There is a new support scam making the rounds and our Cyber Expert has received so many calls about it that she wanted to pass along a warning to you.Theresa Payton says cybercriminals are making unsolicited calls to people's homes to say that they are customer service from Microsoft or Apple and that they proactively noticed a problem on your computer. While it may sound like great customer service, Payton says it is likely a scam.Her advice and resources follow:How it works:1. They call or ...More >>

If you don't want to be hacked by cyber creeps you must keep tight security on your e-mail I-D and password.We now know that those two items are exactly what hackers are after because then they can get into all of your personal information.The problem is, so many of us don't pay enough attention, still, to e-mail security.WBTV cyber expert Theresa Payton says there are seven steps to getting your account back or preventing cyber criminals from owning it in the first place.Her advice follows:7...More >>

If you don't want to be hacked by cyber creeps you must keep tight security on your e-mail I-D and password.We now know that those two items are exactly what hackers are after because then they can get into all of your personal information.The problem is, so many of us don't pay enough attention, still, to e-mail security.WBTV cyber expert Theresa Payton says there are seven steps to getting your account back or preventing cyber criminals from owning it in the first place.Her advice follows:7...More >>

There's a new resource that can help you compare the apps you put on your devices and see which are best at protecting your privacy.WBTV Cyber Expert Theresa Payton says a new study looked at over 1 million apps. It was an effort between Carnegie Mellon and the Federal Trade commission. They found that some of the fun games like a Fruit Ninja or Angry birds were some of the bigger offenders while Facebook and some Google apps actually did a better job guarding your privacy. Payton says the re...More >>

There's a new resource that can help you compare the apps you put on your devices and see which are best at protecting your privacy.WBTV Cyber Expert Theresa Payton says a new study looked at over 1 million apps. It was an effort between Carnegie Mellon and the Federal Trade commission. They found that some of the fun games like a Fruit Ninja or Angry birds were some of the bigger offenders while Facebook and some Google apps actually did a better job guarding your privacy. Payton says the re...More >>

School and work calendars are jam packed. Holiday shopping is already underway. This is the time of year that social engineering by cybercriminals reaches an all time high. The bad guys know you are on the go and connected to the internet mainly by your smart phone. More >>

School and work calendars are jam packed. Holiday shopping is already underway. This is the time of year that social engineering by cybercriminals reaches an all time high. The bad guys know you are on the go and connected to the internet mainly by your smart phone. More >>

Our Cyber Expert, Theresa Payton, is often asked which smart phone best protects your information.Her answer is simple. She says it depends upon how you use the phone. However, there are four things she says you should look for when shopping for a phone. Her advice follows:Can you lock your phone with a password? Is it something complex like a picture of your face, fingerprint, or a long password?Type in the phone model you are looking at and the words "breached" and "hacked" into your favori...More >>

Our Cyber Expert, Theresa Payton, is often asked which smart phone best protects your information.Her answer is simple. She says it depends upon how you use the phone. However, there are four things she says you should look for when shopping for a phone. Her advice follows:Can you lock your phone with a password? Is it something complex like a picture of your face, fingerprint, or a long password?Type in the phone model you are looking at and the words "breached" and "hacked" into your favori...More >>

This is particularly important for those of you who travel. While this malware called "Dark Hotel" has been found mainly in Asia, not in the United States, Payton says there is a strong likelihood that it will reach our shores sooner than later.More >>

This is particularly important for those of you who travel. While this malware called "Dark Hotel" has been found mainly in Asia, not in the United States, Payton says there is a strong likelihood that it will reach our shores sooner than later.More >>

There are plenty of new devices on the market that might make great holiday gifts for those special people in your life who have multiple electronic devices and need some help protecting them from cyber scammers and spammers.WBTV Cyber Expert Theresa Payton has some tech toys and protection strategies for the holidays. Her advice follows:1. Backup Your Phone/Tablet/Computer: Now you have cool, fun, and on the go ways to back up those devices. What if backing up your information were as easy a...More >>

There are plenty of new devices on the market that might make great holiday gifts for those special people in your life who have multiple electronic devices and need some help protecting them from cyber scammers and spammers.WBTV Cyber Expert Theresa Payton has some tech toys and protection strategies for the holidays. Her advice follows:1. Backup Your Phone/Tablet/Computer: Now you have cool, fun, and on the go ways to back up those devices. What if backing up your information were as easy a...More >>

It seems those born into the digital age either don't understand or don't seem to mind that digital is forever.A new study from MyLife.com, manager of personal online information, asked "millenials" between the ages of 18 and 24 about how they use their smart phones.The results were enough to indicate cause for concern from WBTV Cyber Expert who says the study found 1 in 4 millenials have "embarrassing photos" on their phones.Theresa Payton offers her advice below on storing and the legalitie...More >>

It seems those born into the digital age either don't understand or don't seem to mind that digital is forever.A new study from MyLife.com, manager of personal online information, asked "millenials" between the ages of 18 and 24 about how they use their smart phones.The results were enough to indicate cause for concern from WBTV Cyber Expert who says the study found 1 in 4 millenials have "embarrassing photos" on their phones.Theresa Payton offers her advice below on storing and the legalitie...More >>

If you are younger than 30, you probably cannot remember a time when you didn't have internet access. The World Wide Web turned 25 years old this year and according to a recent survey, many people feelMore >>

National Cyber Security Awareness Month, or NCSAM, is observed each October and it is in it's 10th year. This is sponsored by the Department of Homeland Security and the National Cyber Security AllianceMore >>

Spending just a few minutes double-checking your privacy and security can make a big difference.More >>

Apple has added an entirely new layer of security. Apple committed they will NOT build a profile of you that they turn around and sell based on reading and aggregating your email content or web browsingMore >>

Some changes are a part of the new operating system available for users.More >>

There are so many new cyber lessons to learn. Just when we think we have one down, there's a new twist. Don't post pictures of your vacation while you're on vacation because it lets people know you'reMore >>

Professor creates a website that uses photos of family pets to prove how trackable we all are.More >>

Have you heard of FOMO? It is the trendy term for the Fear of Missing Out. So many of us feel it when we're distanced from our smart phones or tablets for too long. Even though we might want to unplugMore >>

Ever wish you could use your iPhone without worrying about your privacy? Many of us don't realize that we may hold the power of privacy in our hands. Apple has heard its customers loud and clear andMore >>

If you're the kind of person who often loses their keys at the bottom of their purse, some new technology might help. Some new apps may let you open the door to your home with a virtual key instead.More >>

New apps make it easier to get into your home but there are some questions you should ask before you use them.More >>

So many of us use social media sites like Facebook and Instagram as the way we share our favorite photos with our friends and relatives. Cyber expert, Theresa Payton, says once a picture is digitallyMore >>

It is hard to keep your photos private when sharing with friends on social media, but our Cyber Expert says there are other options.More >>

It isn't easy to stay one step ahead of your teenage kids online. You don't want to spy but you want to stay involved in what they're doing without crossing a line. A recent survey by the Pew ResearchMore >>

It is important that parents have a sense of their children's online activities without making their teens feel like they can't be trusted.More >>

It happens in most families. You realize somehow your kids were able to download things from the internet but the catch is the download had a price and it was connected to your debit or credit card.More >>

Steps you can take to make sure your kids don't make accidental online purchases.More >>

Have you ever wondered just where your stolen credit card numbers end up and what they're worth to thieves? When the cybercriminals steal your credit card info they have to race against the clock toMore >>

Our cyber expert gives us a sneak peek into the cybercriminal underground.More >>

It's another sign we are living in a digital age. Many family attorneys now say they are seeing a trend where couples discuss BEFORE they get married what happens to the digital data they accumulate whileMore >>

As "pre-nups" become more common, couples are adding something new.More >>

Last year, the U.S. Immigration and Customs Enforcement's Homeland Security Investigations (HSI) worked over 4,000 online sexual predator investigations. ICE logged almost one million hours workingMore >>

Immigration and Customs Enforcement offers assistance to families in catching and reporting predators of children.More >>

Most recently it was restaurant chain PF Chang's and it's customers who fell victim to online hackers targeting debit and credit card numbers. The hack is still under investigation and the US Secret ServiceMore >>

Steps you can take in the weeks following the most recent debit and credit security breach.More >>

More of you are managing your online privacy in strict ways. According to a Pew Research Center phone survey of US adults, almost 9 in 10 Internet users said they are taking active steps online to removeMore >>

Social media giant plans to roll out a new function that will help you manage who is seeing your posts.More >>

It is called Ransomware. Recently, some people living in Australia woke up to find their iPhones and iPads were being held hostage. Now the same attack is traveling the globe. The ransomware is goingMore >>

Virus first hits in Australia and now our Cyber Expert says it is making its way to other countries, including ours.More >>

In April, Microsoft stopped supporting Windows XP and Office 2003. The products still work but Microsoft won't be creating any new patches to fix security problems. Scammers are now searching for WindowsMore >>

As Microsoft stops supporting it's Windows XP platform, users need to know where to go to get honest help with security issues.More >>

A report released by the Pew Research Center says the number of Americans who say they've had their accounts hacked and important personal information stolen online is on the rise. 18% of adults saidMore >>

New research shows the number of people who have had their personal information online hacked is growing.More >>

According to a new report released by the Electronic Frontier Foundation, the FBI is building the facial recognition database of the future, the Next Generation Identification (NGI). However, thisMore >>

Many of our favorite, free email programs are not private. Our cyber expert says it really is happening across all email applications and it is buried in the privacy policies. Look closely at theMore >>

Another reason you should be reading online user agreements very closely.More >>

Did you change your passwords after you heard about Heartbleed? If so, you did the right thing. However, we've learned the worst isn't over and you will likely need to change them again. First, a littleMore >>

Changing your passwords just once may not actually be enough to battle this internet bug.More >>

It is something few of us have heard about or pay attention to but if you want a web address on the internet you turn to ICANN. It stands for Internet Corporation for Assigned Names and Numbers and itMore >>

The organization that decides on the names and addresses on the web is about to come under new management and our cyber expert says the internet community is concerned.More >>

Cyber Expert Theresa Payton often warns us that we should turn the WiFi on our devices to the "off" position if we're not using it. She says it is a good way to protect your privacy and security. NowMore >>

Have you set up a Yahoo id as a back up email address but haven't used it for a while? Where tonight there's a warning you need to know! Yahoo plans to recycle Yahoo user IDs that have been inactiveMore >>

If you haven't used yours in a while it may be in jeopardy of falling in someone else's hands.More >>

When you are in love with someone, you trust that person and they trust you. In this digital age, sometimes we profess our love digitally when we're apart, however, you need to be very careful, even withMore >>

CHARLOTTE, NC (WBTV) - Most of us will hit up our favorite online search engines several times a day, if not more, looking for all types of information. Scammers know that and they've figured out howMore >>

CHARLOTTE, NC (WBTV) - The roadway sensors used to help guide traffic reports reads data emitted by cars. But the Department of Homeland Security has issued a warning about this practice. It's spookyMore >>

There's a new warning that the technology that is supposed to help you know how to avoid a traffic jam could put your driving patterns at risk.More >>

CHARLOTTE, NC (WBTV) - A popular gift for the holidays will be a new tablet, laptop, desktop or smart phone. It may be faster, lighter, and have more features, but maybe there is a year's worth of informationMore >>

Our cyber expert offers advice in navigating the challenge of transferring files from an outdated smart phone, laptop or tablet to a new one.More >>

CHARLOTTE, NC (WBTV) - Cyber Monday is one of the most popular shopping days of the year for consumers, retailers and cybercriminals. This year ICE and Global law enforcement conducted Project CyberMore >>

Highlights how deep the problem is and how scammers are trying to get your personal information or sell you phony goods.More >>

CHARLOTTE, NC (WBTV) - Those of you working on the 4G network swear by it and get frustrated when it cannot be accessed. It might upset you to learn that 4G networks are vulnerable and just a few on-purposeMore >>

Good-guy hackers take down the network to show how easy it would be to accomplish.More >>

CHARLOTTE, NC (WBTV) - It was a big story during the last election cycle. A young man hacked into Governor Sarah Palin's account and posted her emails. He was convicted of a misdemeanor charge. NowMore >>

CHARLOTTE, NC (WBTV) - We're entering one of the busiest times of year for sending and receiving packages. We've told you before that criminals go where the action is and we're on your side watching forMore >>

Cyber creeps are cashing in on this being the busiest time of the year for shipping packages.More >>

CHARLOTTE, NC (WBTV) - We have talked to you before about setting ground rules for the teens in your life that have cell phones. Rules such as "Digital is Forever", "Don't talk to strangers", and "WouldMore >>

Our Cyber Expert says they're called decoy apps and kids know how to use them.More >>

CHARLOTTE, NC (WBTV) - March 8, 2012 was going to be a potentially crazy day on the Internet where unsuspecting computers connected to world wide malware would stop talking to the Internet. That dateMore >>

You can take a few easy steps to ensure you'll still have internet access after July.More >>

CHARLOTTE, NC (WBTV) - Another reason to think before you click a link is surfacing. Cyber criminals realize that more and more of you are booking all your travel online which means you are receivingMore >>

It's a busy time of year for travel and we know that the criminals go where the action is.More >>

CHARLOTTE, NC (WBTV) - It's hard to believe that some thieves aren't bright enough to know not to log into Facebook inside the homes they rob. However, some aren't. It is an example of how crime doesn'tMore >>

New technology is helping police solve crimes and you can think like an investigator if you do it safely.More >>

CHARLOTTE, NC (WBTV) - It seems as if we have a scrapbook of our lives trapped on our phones, tablets and computers. Messages from loved ones, important projects, pictures, and videos. Those momentsMore >>

Cyber expert breaks down safe places to store your data and what you need to think about before you sign up for a service.More >>

CHARLOTTE, NC (WBTV) - We just learned that Skype has known about a security bug that shows your IP address, which can let someone track you and your account down to the city level. One group claimsMore >>

CHARLOTTE, NC (WBTV) - The fight against spam might get a little easier. Facebook recently announced it is ramping up its efforts to stop spammers by creating the "Antivirus Marketplace". The serviceMore >>

CHARLOTTE, NC (WBTV) - Website match.com claims that 1 in 5 relationships start online. We all have busy lives so for those of you that are single, it's harder and harder to meet people to date. WeMore >>

New apps utilize the location services on your cell phone to help you meet your mate.More >>

Fascinating technology that might help you identify people in pictures on Facebook is also being used by some law enforcement to identify criminals. We look into what happens if the technology falls into the wrong hands.More >>

You get busy on vacation or with your life and you forget to pay that credit card bill on time. We have lots of handy reminders from the credit card companies to keep us from becoming too delinquent. But what if the late notice is not the real deal? How would you know? More >>